Peer-to-Peer Behaviour Detection by TCP Flows Analysis

A heat sensitive cable operable over a temperature range of between approximately -20 DEG F. and 1650 DEG F. The cable includes a tubular metallic sheath which is substantially temperature resistant and moisture impervious. It also includes a mass of compacted insulation material filling the sheath and having an insulation resistance variable with temperature in the range of between approximately 100 and 50,000 ohms. The cable further includes at least one thermoelectric conductor positioned within the insulation material filling the sheath. A method of manufacturing the cable includes the step of preparing the insulation material and advancing the thermoelectric conductor through a given region. It also includes the step of advancing a strip of flat metal material past apparatus for forming and welding a tubular sheath surrounding the given region. The method further includes the step of concurrently depositing the insulation material within the tubular sheath for enclosure and advancing the sheath, insulation material and conductor through apparatus for reducing the diameter of the sheath and applying tension to the conductor. With these steps, the insulation material is compacted and the conductor is positioned within the sheath.

[1]  Adam Wierzbicki,et al.  Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.

[2]  John Kubiatowicz,et al.  Extracting guarantees from chaos , 2003, CACM.

[3]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[4]  Jintae Lee,et al.  An end-user perspective on file-sharing systems , 2003, CACM.

[5]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.

[6]  Balachander Krishnamurthy,et al.  Traffic classification for application specific peering , 2002, IMW '02.

[7]  Ian T. Foster,et al.  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.

[8]  Balachander Krishnamurthy,et al.  Early measurements of a cluster-based architecture for P2P systems , 2001, IMW '01.

[9]  Balachander Krishnamurthy,et al.  Characterizing large DNS traces using graphs , 2001, IMW '01.

[10]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[11]  H. Balakrishnan,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[12]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[13]  Matthew Roughan,et al.  P2P the gorilla in the cable , 2003 .

[14]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[15]  Richard Lethin,et al.  Technical and Social Components of Peer-to-Peer Computing , 2003 .

[16]  Stephanos Androutsellis-Theotokis,et al.  A Survey of Peer-to-Peer File Sharing Technologies , 2002 .

[17]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[18]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.